pwwl / tep-attack-simulatorLinks
ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From theory to practice"
☆16Updated 2 years ago
Alternatives and similar repositories for tep-attack-simulator
Users that are interested in tep-attack-simulator are comparing it to the libraries listed below
Sorting:
- An Adaptive Misuse Detection System☆46Updated last year
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- NetworkAssessment: Network Compromise Assessment Tool☆94Updated last year
- Web Path Finder☆60Updated 2 years ago
- PowerShell Script Analyzer☆70Updated 2 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated last year
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Subdomains scanner Spider☆13Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆26Updated 4 months ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆29Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- Some of my rough notes for Docker threat detection☆49Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆110Updated 2 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Updated 2 years ago
- ☆35Updated 2 years ago
- vulnlab.com reaper writeup☆27Updated 2 years ago
- Simple Latest CVE Collector Written in Python☆59Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆15Updated 3 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- ☆33Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- ☆31Updated 2 years ago